lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <22203.1047772779@www31.gmx.net>
Date: Sun, 16 Mar 2003 00:59:39 +0100 (MET)
From: Rynho Zeros Web <hackargentino@....net>
To: bugtraq@...urityfocus.com
Subject: PHP-Nuke 5.5 and 6.0: Path Disclosure


+  Product -> PHP-Nuke
+  Version -> 5.5, 6.0 (other versions not tested jet)
+  Website -> http://www.phpnuke.org
+ Problems -> Path Disclosure

+ Explanation:
The fault happens in the file print.php, which this including in the modulos
'News' and 'AvantGo', in the same one is checked that the variable $sid
exists, but its content is not controlled, since if he is equal to NULL or not it
corresponds with I articulate in the data base, generates an error.

+ Exploit: This vulnerability may be exploited by accessing one of the
following vulnerable scripts:

http://www.target.x/modules.php?name=AvantGo&file=print&sid=
http://www.target.x/modules.php?name=News&file=print&sid=
http://www.target.x/modules.php?name=AvantGo&file=print&sid=[Any_Text]
http://www.target.x/modules.php?name=News&file=print&sid=[Any_Text]

[..]
Another one bug also has been found in "Forums" (Splatt Forums
3.2)
module:

http://www.target.x/modules.php?op=modload&name=Forums&file=attachment&AtchOp=show
[..]

+ Path AvantGo & News only:

http://www.rynhozeros.com.ar/files/site/own/fixes/PHPNuke6.0_5.5_etc.zip

-- 
XyBØrG
WebMaster de:
www.RZWEB.com.ar
Powered By Dattatec.Com

+++ GMX - Mail, Messaging & more  http://www.gmx.net +++
Bitte lächeln! Fotogalerie online mit GMX ohne eigene Homepage!



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ